CWE
284
Advisory Published
CVE Published
Updated

CVE-2016-5582

First published: Sun Oct 16 2016(Updated: )

It was discovered that the Hotspot component of OpenJDK did not check types of System.arraycopy() function arguments src and dest in certain cases. An untrusted Java application or applet could use this flaw to corrupt virtual machine's memory and bypass Java sandbox restrictions.

Credit: secalert_us@oracle.com

Affected SoftwareAffected VersionHow to fix
Oracle JDK 6=1.6.0-update121
Oracle JDK 6=1.7.0-update111
Oracle JDK 6=1.8.0-update101
Oracle JDK 6=1.8.0-update102
Oracle Java Runtime Environment (JRE)=1.6.0-update121
Oracle Java Runtime Environment (JRE)=1.7.0-update111
Oracle Java Runtime Environment (JRE)=1.8.0-update101
Oracle Java Runtime Environment (JRE)=1.8.0-update102

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2016-5582?

    CVE-2016-5582 has a severity rating of high due to the potential for memory corruption and exploitation.

  • How do I fix CVE-2016-5582?

    To fix CVE-2016-5582, users should update to the latest versions of Oracle JDK and JRE that address this vulnerability.

  • Which versions of JDK are affected by CVE-2016-5582?

    CVE-2016-5582 affects Oracle JDK versions 1.6.0-update121, 1.7.0-update111, and 1.8.0-update101 and 1.8.0-update102.

  • Can CVE-2016-5582 be exploited remotely?

    Yes, CVE-2016-5582 can be exploited remotely through an untrusted Java application or applet.

  • What are the potential consequences of exploiting CVE-2016-5582?

    Exploiting CVE-2016-5582 could lead to memory corruption and allow attackers to bypass Java sandbox restrictions.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203